MoNet ECSE6962 Fall’04 Class Schedule

 

8/30: Administrative issues.

            Course Homepage

About the course

            Syllabus

            Schedule

          List of Suggested Projects  (including project deadlines)

 

 

            Reference material:

-         [1] A. Kumar, D. Manjunath and J. Kuri, “Communication Networking: An Analytical Approach,” 1st ed., Morgan Kaufman Publishers (Elsevier).

 

9/2: Multiple Access in Wireless Networks

 

Random Access: Aloha, S-Aloha and CSMA/CA, RTS/CTS

Reference material:

-         Section 8.5 from [1] (skip the details of the mathematical analysis if it was not covered in class).

-         P. Karn, “MACA- A New Channel Access Method for Packet Radio,” ARRL/CRRL Amateur Radio 9th Computer Networking Conference, September 22, 1990.

Reading material:

·        V. Bharghavan et al., MACAW: A Media Access Protocol for Wireless LAN’s,” Computer Communication Review, vol. 24, no. 4, Oct. 1994, p 212-25. (Note:  must be on campus or have the library web proxy enabled)

 

9/6: Labor Day – Institute Holiday.

9/9:  IEEE802.11 MAC

Reference material:

-         Section 8.6 from [1].

 

9/13: MAC3- 802.11 analysis. (Assignment1 distributed in class.)

Reference material:

-         Y.C. TAY and K.C. Chua, “A Capacity Analysis for the IEEE 802.11 MAC Protocol,” Wireless Networks, vol. 7, no.2, March 2001 p. 159-171.

 

9/16: MAC3- 802.11 analysis.

Reference material:

-         Wei Ye, John Heidemann, and Deborah Estrin, “Medium Access Control with Coordinated, Adaptive Sleeping for Wireless Sensor Networks,” ACM/IEEE Transactions on Networking, 12 (3 ), pp. 493-506, June, 2004. (A preprint is available as Technical Report ISI-TR-567, USC/Information Sciences Institute)

 

9/20: Reactive Routing in Ad hoc networks

Reference material:

-         Lecture Slides

-         David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153–181. Kluwer Academic Publishers, 1996.

-         Perkins, C.E.; Royer, E.M  Ad-hoc on-demand distance vector routing., Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on , 25-26 Feb. 1999 Page(s): 90 –100.

Reading material:

-         Perkins, C.E.; Royer, E.M.; Das, S.R.; Marina, M.K. Performance comparison of two on-demand routing protocols for ad hoc networks, Personal Communications, IEEE [see also IEEE Wireless Communications], Volume: 8 Issue: 1 , Feb. 2001, Page(s): 16 -28

9/23: Analysis of Reactive Routing

Reference material:

- Lecture Slides

- N. Zhou, H. Wu and A. Abouzeid, “Reactive Routing Overhead in Networks with Unreliable Nodes,” Proceedings of MobiCom 2003, San Diego, CA, September 2003.

9/27: Clustering & Hierarchical Routing

Reference Material:

-         E. M. Belding-Royer, “Multi-level hierarchies for scalable ad hoc routing,” Wireless Networks, Volume 9, Issue 5  (September 2003) Pages: 461 - 478 

List of Suggested Projects

 

9/30: Clustering & Hierarchical Routing  (Continued) Assignment1 due; Assignment2 distributed in class

Reference Material:

A.B. McDonald and T.F. Znati, “A mobility-based framework for adaptive clustering in wireless ad hoc networks,” IEEE Journal on Selected Areas in Communications, Volume: 17 Issue: 8, Aug. 1999,  Page(s): 1466 –1487.

10/4:  Power-aware routing.

-         Suresh Singh, Mike Woo and C. S. Raghavendra, “Power Aware Routing in Mobile Ad Hoc Networks,” Proceedings of the 4th annual ACM/IEEE international Conference on Mobile Computing and Networking, pp. 181-190, October 1998.

-         Lecture Notes

10/7:  Mobility models for ad-hoc networks. Assignment2 due

-         Tracy Camp, Jeff Boleng and Vanessa Davies, “A survey of Mobility Models for Ad Hoc Network Research,” Wireless Communication and Mobile Computing (WCMC): Special Issue on Mobile Ad Hoc Networking: Research, Trends and Applications, Vol.2, No.5, pp. 483-502, 2002.

 

10/12: Mathematical analysis of mobility models.

-         J. Yoon, M. Liu and B. Noble, “Random Waypoint Considered Harmful,” Proceedings of IEEE INFOCOM 2003, pp. 1312-21, 2003.

10/14: Transport protocols in ad-hoc networks.

-         K. Chandran, S. Raghunathan, S. Venkatesan and R. Prakash, “A Feedback Scheme for Improving TCP Performance in Ad-Hoc Wireless Networks,” IEEE Personal Communications, February 2001.

 

 

10/18: MidtermI ; Project Topics due (email ok)

10/21: Transport Protocols for sensor networks

-         Y. Sankarasubramaniam, O.B. Akan and I.F. Akyildiz, “ESRT: Event-to-Sink Reliable Transport in Wireless Sensor Networks,” Proceedings of MobiHoc’2003. Presentation Slides.

 

10/25: Sensor Networks Applications: Exposure Problems.

         - V. Phipatanasuphorn and P. Ramanathan, “Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring,” IEEE Transactions on Computers, 2003.

         - also see: T. Clouqueur, P. Ramanathan and K.K Saluja, “Analysis of exposure of target activities in a sensor network with obstacles

 10/28:

11/1: Data Aggregation in Sensor Networks Project Abstract and Introduction due

Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, Fabio Silva, “Directed diffusion for wireless sensor networking,”  IEEE/ACM Transactions on Networking, Volume 11 ,  Issue 1  (February 2003) Pages: 2 – 16, 2003 .

 

11/4: Data-Centric Routing

B. Krishnamachari, D. Estrin and Stephen Wicker, “The Impact of Data-centeric Routing in Wireless Sensor Networks,” Proc. of International Distributed Computing Workshop, 2002.

 

11/08: Data-Centric Routing

S. Pattern, B. Krishnamachari and R. Govindan, “The Impact of Spatial Correlation on Routing with Compression in Wireless Sensor Networks,” IPSN’04, April 2004.

 

 

11/11: Localization

T. He et al. “Range-free Localization Schemes for Large Scale Sensor Networks,” Proceedings of MobiCom 2003.

 

 

11/15: MidtermII

 

11/18: Connectivity and Capacity (Recent results by Gupta and Kumar):

            - Threshold for asymptotic connectivity for one-dimensional network

            - Extension to the case of two-dimensional network

            - Approximate capacity analysis

            - Implications

            Reference material:

- Text notes [1] distributed in class.

 

 

 

11/22: Security in wireless ad hoc networks


11/25 Thanksgiving recess - no class

11/29: Wireless Cellular Networks


Reference material:


12/2: Hybrid Wireless Networks


Reference material:

===========================================================================================================================================

12/7 and 12/9: Project Presentations